Data Protection Reports

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

Infographic: 5 cybersecurity predictions for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

TechTarget ComputerWeekly.com

Backup Basics: Disk, CDP and Cloud
sponsored by Barracuda Networks
EGUIDE: Check out this exclusive SearchDataBackup.com E-Guide for an expert look at backup approaches including continuous data protection (CDP), cloud and disk.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

Barracuda Networks

Protecting Server Data in Small and Medium-sized Businesses
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.
Posted: 11 Jan 2010 | Published: 01 Sep 2006

Iron Mountain

E-Guide: Continuous Data Protection Backup Tutorial on CDP Tools, Part 2
sponsored by FalconStor Software
EGUIDE: The Storage Networking Industry Association (SNIA) defines CDP as "a class of mechanisms that continuously capture or track data modifications enabling recovery to previous points in time." In part two of this tutorial on continuous data protection backup, learn how CDP is being used today, and about the latest CDP products.
Posted: 20 May 2011 | Published: 20 May 2011

FalconStor Software

Arcserve Unified Data Protection Cuts Downtime for Cloud DR
sponsored by arcserve
EGUIDE: In this expert-guide, learn about Arcserve's new Unified Data Protection system, which the claim delivers a five-minute recovery time objective and 15-minute recover point objective for data, and figure out if this service is fast enough for you.
Posted: 09 Feb 2018 | Published: 05 Feb 2018

arcserve

Case Study: First Trade Union Bank Adds Vault for LAN-Speed Restores and Robust Replication
sponsored by i365, makers of Evault
CASE STUDY: Despite the economic downturn, First Trade Union Bank is continuing to grow... this case study examines the data center challenges the bank faced in the midst of this growth and show's how by working with i365, they were able to create faster backups/restores, in some cases reduce RTO's by up to 98%, enhance DR and protect their virtual servers.
Posted: 30 Jun 2009 | Published: 30 Jun 2009

i365, makers of Evault

E-Book: IT Handbook - Backup and Recovery
sponsored by Vizioncore Inc.
EBOOK: Before you begin researching all of the available backup and disaster recovery technologies on the market, get a handle on your business needs. Read thisĀ e-book to learn about developing a backup and disaster recovery strategy, implementation guidelines for backup and dr, remote backups, and testing and verifying your backups.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

Vizioncore Inc.

New Data Protection Strategies
sponsored by IBM
WHITE PAPER: As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to business.
Posted: 23 Jul 2010 | Published: 20 Jul 2008

IBM